Vulnerabilities / Threats
7/1/2015
04:15 PM
Connect Directly
Twitter
RSS
E-Mail
100%
0%

Smart Cities' 4 Biggest Security Challenges

The messiness of politics and the vulnerability of the Internet of Things in one big, unwieldy package.

It's no secret that Internet of Things devices like Nest smart meters and Fitbits are behind the curve on information security -- lax encryption and access control standards for both wireless network and data security, for starters. So what about when IoT devices run a "smart city," and the public water system, power grid, waste management, traffic control, street lighting, public transportation, and physical security systems are all as vulnerable as that Fitbit on your wrist?  

"Most cities around the world are unprotected to cyber attacks," says Cesar Cerrudo, CTO of IOActive. At DEF CON last year, Cerrudo presented research about serious vulnerabilities in vehicle traffic control systems, which could be exploited to cause traffic jams or crashes. His studies inspired him to create Securing Smart Cities, a global non-profit initiative established in May by IOActive, Kaspersky Lab, Bastille, and the Cloud Security Alliance with the purpose of better definining the security challenges of smart cities and finding workable solutions.  

"Cities are really important, because they're the backbones of civilization. They're the backbones of economy," says Greg Conti, associate professor and director of the Army Cyber Institute at West Point. Conti, along with West Point associate professor David Raymond and Drawbridge Networks CTO Tom Cross, will be presenting a session on "Pen Testing a City" at the Black Hat Briefings in August.

"We're going to be looking at the security of cities, whether they're dumb, moderately intelligent or smart," says Conti.

What makes cities, particularly "smart" cities, uniquely challenging?

Insecure Products & Insufficient Testing

One of the biggest concerns about smart buildings and smart cities is that the sensors in the equipment can be hacked and fed fake data -- which could be used for all manner of mischief, like causing signal failures that shut down subways or allowing contaminants into the water supply.

"Most product vendors are releasing hardware, software without any security, and governments are releasing it without any testing," says Cerrudo. Although they may test rigorously for functionality, cybersecurity won't be part of the process. Cerrudo discovered there were 200,000 vulnerable traffic control sensors installed in cities across the world, including New York, Washington D.C., and London.

Cross says that people's attitudes toward new technology's vulnerabilities often slide through something like the five stages of grief. First it's "denial," when they remain too enamored of the technologies' fun functions to consider the risks. Then they'll move through "anger," "bargaining," "depression," and eventually "acceptance." "Smart cities technology are following the same pattern," he says, and there's still a long way to go before we reach acceptance.

As Cerrudo wrote in a report in April, "At IOActive Labs, we continue to see vendors that do not know anything about cyber security; they lack skilled security people and don’t seem interested in improving security. For instance, many vendors don’t object to giving full privileged access to a device or system to anyone who is on a local network, because they think of the internal network as safe."

Huge, Complex Attack Surface

The trouble is, the notion of "internal network" doesn't really translate to smart cities. The trend is, the smarter the city, the more computer systems, the more integration between the systems, and the more open the access to the data collected by all those systems. 

As futurologist Dr. Simon Moores said at the IFSEC conference last month, the task of integrating an entire city of buildings outfitted with smart electric meters, doors, HVAC systems, and lighting is an "almost intractable problem."

Cross explains that the challenge of integration is not just technological; it's about all the operational interdependencies that exist in a city. "If the subway shuts down, people can't get to their jobs, and then other things don't get done," he says.

Cerrudo explains that attackers know about this "cascade effect," and that they can use it to their advantage by launching an attack on a small, poorly secured system that doesn't seem very critical, and setting off a chain reaction.

The definition of "critical" may vary from city to city, too. Cross says to look at something like Las Vegas. "The economy is very dependent on casinos," he says, "but casinos are not considered critical infrastructure."

The degree of complexity also varies by the age and the size of the city -- an aspect Conti, Cross, and Raymond plan to discuss at Black Hat. "We're getting a sense there may be a sweet spot," says Conti. A city that's somewhere in the middle in terms of size and age, "small enough that it can get its arms around its technology," using "new but not necessarily bleeding-edge" technology" seems to have the best chance of success. "We thought that was an interesting dynamic," he says.

Lack of Oversight and Organization

At IFSEC, Moores posed the rhetorical question, "Who's responsible when a smart city crashes?"

Other experts agree that in many cities there is still no clear cybersecurity leadership, and that cities need to establish city-specific CERTs and/or security operations centers -- not just for information sharing, but also for cross-function vulnerability assessment and incident response planning.

"Each fiefdom can't develop infrastructure in a vacuum," says Cross.

IOActive's Cerrudo says cities need to start treating cybersecurity in the same way the private sector does.

Shifting Politics, Shifting Budgets

That's all easier said than done.

"Cities are ultimately political beasts, with responsibilities to the populace," and with that comes increased visibility, Conti says. That increased visibility can ultimately be either good or bad for security, but either way it will be subject to public scrutiny in a way that regular companies don't need to consider.

Plus, getting budget for security always requires a process of educating leaders and obtaining their buy-in. However, in the public sector, the leaders and the budgets may change severely every time there's an election.

"If [the elected official gets] tossed out, you have to start the process over again," Cross says. 
"You constantly have to reeducate and resell."

Conti adds that often there will be a failure or a breach that is the event that transforms a leader's attitude towards security. "The new leader," he says, "hasn't gone through the same transformative event."

And the security skills shortage tends to be worse in the public sector, according to Cross. "The most talented people work in the private sector," he says, "because they get better salary and compensation."

"Security problems in cities are real and are current," Cerrudo says. "The possibilities are out there ... So we need to start working on improving security right now."

Sara Peters is Senior Editor at Dark Reading and formerly the editor-in-chief of Enterprise Efficiency. Prior that she was senior editor for the Computer Security Institute, writing and speaking about virtualization, identity management, cybersecurity law, and a myriad ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Ninja
7/4/2015 | 9:13:42 AM
Re: Smarter Cities Securoty Challenges
@Peter: Indeed, malware even found its way onto the International Space Station via an infected flash drive!

It really makes me paranoid about accepting free flash drives from vendors at conferences; that's for sure.
Peter Williams
50%
50%
Peter Williams,
User Rank: Apprentice
7/2/2015 | 4:57:10 PM
Smarter Cities Securoty Challenges
Actually - far from Nest and such being the issue, I would guess that the the bigger threat to infrastructure is ancient PLCs being found on Shodan that still have the manufacturer's default password hard coded into them...That, and some idiot sticking an infected flash-drive in the machine running the SCADA system.

One angle that may offer some hope is the growing focus on resilience, where the need for multi -disciplinary working etc to plan for and manage disasters seems to be inceasingly accepted.  At least some cities include cyber events in their resilience planning - maybe we could make it more widespread?

 
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Ninja
7/2/2015 | 6:06:34 AM
Las Vegas
The Las Vegas example got me thinking about what would happen if the Strip were shut down for a day.

And, having worked for the Nevada Attorney General in a role that dealt, in part, with utilities issues, the first thing that came into my mind was that -- despite the economic loss -- there'd be a HUGE savings in energy and natural resources.
Blog Voyage
100%
0%
Blog Voyage,
User Rank: Strategist
7/2/2015 | 2:55:40 AM
What a big work
Very nice ideas, but it will be a very hard work. As you know, security is a very difficult job. Wait and see.
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Five Emerging Security Threats - And What You Can Learn From Them
At Black Hat USA, researchers unveiled some nasty vulnerabilities. Is your organization ready?
Flash Poll
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7445
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

CVE-2015-4948
Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

CVE-2015-5660
Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

CVE-2015-6003
Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

CVE-2015-6333
Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio
Cybercrime has become a well-organized business, complete with job specialization, funding, and online customer service. Dark Reading editors speak to cybercrime experts on the evolution of the cybercrime economy and the nature of today's attackers.